Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/02/2023, 10:49

General

  • Target

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe

  • Size

    2.5MB

  • MD5

    e1c771cceb693ea14bbcde32ac1355fc

  • SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

  • SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

  • SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • SSDEEP

    24576:CsLDsY5ohQjNm5lGrJrGU/thfLixwfA7DgCBbZoiSNy5aKg88vX6yqlAtVULkfSO:C3FYVr4U/3L7yRAUQKuakLomg0BqKqw

Malware Config

Extracted

Family

remcos

Botnet

IKMERRO2023

C2

5.2.68.82:1198

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    Explorer.exe

  • copy_folder

    ATM Machine

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    1234567ME

  • mouse_option

    false

  • mutex

    12345ME-2V5C4Q

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    Explorer

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
    "C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4164
    • C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
      C:\Users\Admin\AppData\Local\Temp\70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\ProgramData\ATM Machine\Explorer.exe
        "C:\ProgramData\ATM Machine\Explorer.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3128
        • C:\ProgramData\ATM Machine\Explorer.exe
          "C:\ProgramData\ATM Machine\Explorer.exe"
          4⤵
          • Executes dropped EXE
          PID:4656
        • C:\ProgramData\ATM Machine\Explorer.exe
          "C:\ProgramData\ATM Machine\Explorer.exe"
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetWindowsHookEx
          PID:3968
        • C:\ProgramData\ATM Machine\Explorer.exe
          "C:\ProgramData\ATM Machine\Explorer.exe"
          4⤵
          • Executes dropped EXE
          PID:1780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ATM Machine\Explorer.exe

    Filesize

    2.5MB

    MD5

    e1c771cceb693ea14bbcde32ac1355fc

    SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

    SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

    SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • C:\ProgramData\ATM Machine\Explorer.exe

    Filesize

    2.5MB

    MD5

    e1c771cceb693ea14bbcde32ac1355fc

    SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

    SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

    SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • C:\ProgramData\ATM Machine\Explorer.exe

    Filesize

    2.5MB

    MD5

    e1c771cceb693ea14bbcde32ac1355fc

    SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

    SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

    SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • C:\ProgramData\ATM Machine\Explorer.exe

    Filesize

    2.5MB

    MD5

    e1c771cceb693ea14bbcde32ac1355fc

    SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

    SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

    SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • C:\ProgramData\ATM Machine\Explorer.exe

    Filesize

    2.5MB

    MD5

    e1c771cceb693ea14bbcde32ac1355fc

    SHA1

    bc2da06db4b0cc42595b7761ff990e303441cd99

    SHA256

    70a0d6207bf07b9d71452c71fc65c9b8335d2099796d70a25ec6f2a03090daa9

    SHA512

    fcbb24d7f938145fb82bd6d1d609a4416d78a9285499078ddabf558cac050319bac06c2b6fccdea3ec558e71c5589fb2bc76c6bee6cb4d02dd2691ded8ef2eff

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    4280e36a29fa31c01e4d8b2ba726a0d8

    SHA1

    c485c2c9ce0a99747b18d899b71dfa9a64dabe32

    SHA256

    e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

    SHA512

    494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    53KB

    MD5

    06ad34f9739c5159b4d92d702545bd49

    SHA1

    9152a0d4f153f3f40f7e606be75f81b582ee0c17

    SHA256

    474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba

    SHA512

    c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    e587085d0b14b3f04eedc15f9f7d703e

    SHA1

    8e1b85a18e71a321a432463b70846839878b8db4

    SHA256

    b96cc14efd59e7fe60801bc93a57447cf1ec7d38090d57a41af2bea51855ff36

    SHA512

    e9796afeb8dd0f8dccd7f3f471f36fc3a95bc24d9d0fa99958986d5fed36eef6bcde09fbd82ad6b489e29d26d3c38d60c5a6ff25689af34877bdf10edf2237f8

  • C:\Users\Admin\AppData\Roaming\Kyjsafxspwa\Dgtxdkhrpw.exe

    Filesize

    2.5MB

    MD5

    06914d2998f5a97addb2f5f4f93721e8

    SHA1

    9d71f97ed4a634deae6fe9c4af992309f818c8b1

    SHA256

    da7c430db04dd9ef9b1dcf1f6134af8e701144ca277bed4f864650b0db199490

    SHA512

    765620681536be110a084b87d088c2e3d7908855dda7b67a947842f5a66c706e4519ecd599321f6de0d31321f41a581b4e31dc15e6f85d3dee72674868f30fe0

  • memory/1496-133-0x0000000005460000-0x0000000005482000-memory.dmp

    Filesize

    136KB

  • memory/1496-132-0x0000000000570000-0x0000000000802000-memory.dmp

    Filesize

    2.6MB

  • memory/2636-143-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2636-144-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2636-145-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/2636-148-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3968-163-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3968-165-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3968-164-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/3968-162-0x0000000000400000-0x0000000000480000-memory.dmp

    Filesize

    512KB

  • memory/4164-135-0x00000000052E0000-0x0000000005316000-memory.dmp

    Filesize

    216KB

  • memory/4164-139-0x0000000006880000-0x000000000689E000-memory.dmp

    Filesize

    120KB

  • memory/4164-140-0x0000000007EE0000-0x000000000855A000-memory.dmp

    Filesize

    6.5MB

  • memory/4164-138-0x00000000061F0000-0x0000000006256000-memory.dmp

    Filesize

    408KB

  • memory/4164-137-0x0000000006180000-0x00000000061E6000-memory.dmp

    Filesize

    408KB

  • memory/4164-141-0x0000000006D80000-0x0000000006D9A000-memory.dmp

    Filesize

    104KB

  • memory/4164-136-0x0000000005950000-0x0000000005F78000-memory.dmp

    Filesize

    6.2MB